cvelist/2016/7xxx/CVE-2016-7035.json

114 lines
3.5 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2018-09-10 12:06:31 -04:00
"CVE_data_meta" : {
"ASSIGNER" : "anemec@redhat.com",
"ID" : "CVE-2016-7035",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
2018-09-10 16:27:06 +02:00
{
2018-09-10 12:06:31 -04:00
"product" : {
"product_data" : [
{
"product_name" : "pacemaker",
"version" : {
"version_data" : [
{
"version_value" : "1.1.16"
}
]
}
}
]
},
"vendor_name" : "ClusterLabs"
2018-09-10 16:27:06 +02:00
}
2018-09-10 12:06:31 -04:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine."
}
]
},
"impact" : {
"cvss" : [
[
2018-09-10 16:27:06 +02:00
{
2018-09-10 12:06:31 -04:00
"vectorString" : "8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version" : "3.0"
2018-09-10 16:27:06 +02:00
}
2018-09-10 12:06:31 -04:00
],
[
2018-09-10 16:27:06 +02:00
{
2018-09-10 12:06:31 -04:00
"vectorString" : "7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version" : "2.0"
2018-09-10 16:27:06 +02:00
}
2018-09-10 12:06:31 -04:00
]
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-285"
}
2018-09-10 16:27:06 +02:00
]
2018-09-10 12:06:31 -04:00
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20161103 CVE-2016-7035 - pacemaker - improper IPC guarding",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/03/5"
},
{
"name" : "[users] 20161103 [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guarding",
"refsource" : "MLIST",
"url" : "https://lists.clusterlabs.org/pipermail/users/2016-November/004432.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035"
},
{
"name" : "https://github.com/ClusterLabs/pacemaker/commit/5d71e65049",
"refsource" : "CONFIRM",
"url" : "https://github.com/ClusterLabs/pacemaker/commit/5d71e65049"
2018-09-11 06:04:32 -04:00
},
{
"name" : "GLSA-201710-08",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-08"
},
{
"name" : "RHSA-2016:2614",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2614.html"
},
{
"name" : "RHSA-2016:2675",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2675.html"
},
{
"name" : "94214",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94214"
2018-09-10 12:06:31 -04:00
}
]
}
2017-10-16 12:31:07 -04:00
}